期刊文献+

Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy

Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy
原文传递
导出
摘要 In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set. In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set.
作者 Aijuan Zhang Cheng Ji Yu Bao Xin Li Aijuan Zhang;Cheng Ji;Yu Bao;Xin Li
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期478-488,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China(Nos.51204185 and 41674030) Natural Youth Science Foundation of Jiangsu Province,China(No.BK20140185) China Postdoctoral Science Foundation(No.2016M601909) the Fundamental Research Funds for the Central Universities(No.2014QNA44)
关键词 spatial object MULTI-GRANULARITY conflict detection MODEL-CHECKING spatial object multi-granularity conflict detection model-checking
  • 相关文献

参考文献2

二级参考文献22

  • 1WANG Wei,ZENG GuoSun.Trusted dynamic level scheduling based on Bayes trust model[J].Science in China(Series F),2007,50(3):456-469. 被引量:14
  • 2Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management, 1994, 2(4) :333-360.
  • 3Moses T. eXtensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 4Jajodia S, Samarati P, Subrahmanian V S et al. A unified framework for enforcing multiple access control policies// Proceedings of the ACM SIGMOD International Conference on Management of Data. Tucson, Arizona, USA, 1997, 26 (2) : 474-485.
  • 5Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proeeedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:31-42.
  • 6Lupu E, Sloman M. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 1999, 25(6): 852-869.
  • 7Cholvy L, Cuppens F. Analyzing consistency of security policies//Proceedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:103-112.
  • 8Dunlop N, Indulska J, Raymond K. Dynamic conflict detection in policy-based management systems//Proceedings of the 6th International Enterprise Distributed Object ComputingConference (EDOC). Lausanne, Switzerland, 2002:15-26.
  • 9Guelev D P, Ryan M, Schobbens P Y. Modei-checking access control policies. Lecture Notes in Computer Science 3225. Berlin: Springer-Verlag, 2004.. 219-230.
  • 10Zhang N, Ryan M, Guelev D P. Synthesising verified access control systems in XACML//Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering. Washington,DC, USA, 2004:56-65.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部